Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Getting Back to the Past in the Union-Find Problem., , and . STACS, volume 294 of Lecture Notes in Computer Science, page 8-17. Springer, (1988)On Suffix Extensions in Suffix Trees., and . SPIRE, volume 7024 of Lecture Notes in Computer Science, page 301-312. Springer, (2011)Sparse certificates for 2-connectivity in directed graphs., , , , and . Theor. Comput. Sci., (2017)2D Color Barcodes for Mobile Phones., , , and . Int. J. Comput. Sci. Appl., 8 (1): 136-155 (2011)Efficient cross-trees for external memory., and . External Memory Algorithms, volume 50 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 87-106. DIMACS/AMS, (1998)Dispersion of Mobile Robots on Directed Anonymous Graphs., , and . SIROCCO, volume 13298 of Lecture Notes in Computer Science, page 191-211. Springer, (2022)Finding Strong Bridges and Strong Articulation Points in Linear Time., , and . COCOA (1), volume 6508 of Lecture Notes in Computer Science, page 157-169. Springer, (2010)Extracting social networks from seized smartphones and web data., , , and . WIFS, page 101-105. IEEE, (2009)Traffic vs topology in network clustering: Does it matter?, , , , , and . IWCMC, page 36-41. IEEE, (2012)New Algorithms for Examination Timetabling., , and . WAE, volume 1982 of Lecture Notes in Computer Science, page 230-242. Springer, (2000)